Skip to main content

Advances, Systems and Applications

Table 1 Security comparison

From: AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

Computation Party

[23]

[24]

[25]

[28]

[38]

The proposed AMAKAS scheme

Mutual authentication

User anonymity

x

x

User

Un-traceability

x

x

x

x

Forward secrecy

User impersonation attack

x

Sever impersonation attack

x

x

×

Replay attack

x

Stolen card attack

x

Man-in-the-middle attack

x

x

x

Known session specific temporary information attack

x

x

x

x